Analysis
-
max time kernel
117s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
5a03a7d7ddb093a43fc9aa01881ddbf5508a1b55aa88d118c8783c8f95de98f8.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5a03a7d7ddb093a43fc9aa01881ddbf5508a1b55aa88d118c8783c8f95de98f8.doc
Resource
win10v2004-20220812-en
General
-
Target
5a03a7d7ddb093a43fc9aa01881ddbf5508a1b55aa88d118c8783c8f95de98f8.doc
-
Size
34KB
-
MD5
a5084fffb2cb1b2e56452f7fb3413ab6
-
SHA1
f565861d3f77ec7b2edb12de7640866ecd72b2a8
-
SHA256
5a03a7d7ddb093a43fc9aa01881ddbf5508a1b55aa88d118c8783c8f95de98f8
-
SHA512
903cfb71d5f2c63a236a011009bc372f6775290906baa6fe09b7002f96f6dbd7dac01fe72aca26ca728e4dfb42608641c04613b2f31657916cf1ff04c5d706af
-
SSDEEP
192:S5ORhH9Um0UpMUpDUp2UphUpoUpHUpaUp9UpB9KNCy0el/Sy0pniCT:S5erc/mZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4824 WINWORD.EXE 4824 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE 4824 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\5a03a7d7ddb093a43fc9aa01881ddbf5508a1b55aa88d118c8783c8f95de98f8.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4824